FOMO DailyFOMO DailyFOMO Daily
Font ResizerAa
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Reading: AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz
Share
Font ResizerAa
FOMO DailyFOMO Daily
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Search
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Copyright © 2026 FOMO Daily - All Rights Reserved.

AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz

How rapid AI innovation is outpacing cybersecurity — and what leaders must do before the next leak.

Miles Rowan
Last updated: November 12, 2025 10:50 pm
Miles Rowan
4 Min Read
Share
4 Min Read

A new cybersecurity study published by Wiz has found that the majority of the world’s top artificial intelligence companies are inadvertently exposing confidential information online, underscoring a growing disconnect between rapid innovation and basic security discipline.

According to the report, 65% of the 50 leading AI companies analyzed had leaked verified secrets on GitHub, including API keys, authentication tokens, and other sensitive credentials. Many of these exposures were buried deep within repositories or deleted forks areas rarely examined by standard scanning tools.

A Preventable Error

According to Glyn Morgan, the Country Manager for the UK & Ireland at Salt Security, the trend is both “glaring and avoidable.”

“When AI companies inadvertently leak their API keys, it points to a fundamental failure in governance and configuration,” he said. “It hands attackers a direct route into systems, models, and data while bypassing the usual defensive layers.”

The Wiz research underlines that these security oversights are far from isolated developer mistakes. As enterprises increasingly partner with AI startups, they become quite exposed to the same kinds of vulnerabilities. Several of the leaks, the report warns, could have exposed private models, organizational structures, and even training data, potentially compromising competitive advantage and intellectual property.

The stakes are high: affected companies collectively have a market valuation of over $400 billion.

Real-World Examples
The study enumerates several examples of exposed secrets:
• LangChain was leaking various LangSmith API keys, including those with permissions to manage organizational members.

• An enterprise-tier ElevenLabs API key was found inside a plaintext file.

• One company from the Forbes AI 50 had an exposed Hugging Face token in a deleted fork, which allowed access to about 1,000 private models. That same company also leaked Weights & Biases keys, exposing data linked to model training.

Hidden Dangers Below the Surface

Traditional code scanning is missing such exposures, according to Wiz, because it is focused narrowly on public repositories. To find deeper vulnerabilities, its researchers adopted a three-dimensional approach they call Depth, Perimeter, and Coverage.

Depth: full commit histories, deleted forks, workflow logs, and gists are reviewed places standard scanners normally don’t look.

• Perimeter expanded the search beyond company repositories to include employees and contributors, who may unwittingly commit secrets to personal projects.

• Coverage sought AI-specific secret types like Weights & Biases, Groq, and Perplexity keys, which conventional tools usually tend to miss.

It appears from the results that the development pace of the AI sector has outpaced its security maturity. Nearly half of Wiz’s attempts at responsible disclosure either received no response or failed to reach the correct contacts, pointing to significant gaps in the vulnerability reporting and response procedures.
What Firms Should Do Now

Wiz enumerates three urgent steps for security leaders:

1. Consider all developers and contributors part of the attack surface. Implement the most stringent policies and procedures when onboarding them, including multi-factor authentication and explicit separation of personal versus professional use of GitHub.

2. Modernize internal secret-scanning practices. Go beyond simple repository checks and adopt comprehensive scans that mirror the Depth-Perimeter-Coverage approach.

3. Extend due diligence to third-party vendors. CISOs should review how AI partners manage credentials and disclosures before integrating their tools. Speed versus Security The report concludes that the very speed driving AI breakthroughs now poses one of the industry’s greatest security threats. As Wiz cautions, “For AI innovators, the message is clear: speed cannot come at the expense of security” a warning extending equally to the enterprises depending on them.

Understanding the Stablecoin Rewards Clarity Act and Section 404
Why the Collapse of the U.S. Senate Crypto Alliance Matters
Grokipedia Beta: xAI’s bold bid to rival Wikipedia now!
Small-Cap Crypto Assets Just Hit a Humiliating Four-Year Low, Proving the Altseason Thesis Is Officially Dead
The Blockchain Battle Over Mercenary Volume and Network Valuation

Sign up to FOMO Daily

Get the latest breaking news & weekly roundup, delivered straight to your inbox.

By signing up, you acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Reddit Telegram Threads Bluesky Email Copy Link Print
ByMiles Rowan
Follow:
A political and culture reporter covering the stories shaping today’s national conversation. With a focus on government policy, elections, and social movements, delivers in-depth analysis and reporting that helps readers understand how power and people intersect. Known for thoughtful journalism and a clear, engaging writing style, provides accurate, trustworthy news that informs and inspires.
Previous Article White House Signals Trump Will Sign Bill to End Government Shutdown
Next Article A Self-Inflicted Crisis at No. 10

Latest News

When Crypto Goes Physical: Inside the Rise of Wrench Attacks and the Binance France Home Invasion Attempt
Cryptocurrency Finance World News
How Aave’s DAO Could Capture $100 Million in Annualized Revenue If SEC Continues Softer Regulation
Cryptocurrency Finance News
Cboe’s Bid to Bring Back Yes No Options and What It Means for Markets
War News
Why Bitcoin’s Next Moves Could Hurt Everyday Traders
Cryptocurrency Finance News
Why XRPL’s Big Share of Tokenized T-Bill Supply Isn’t Triggering Big Trading Action
War News
Why Tether’s $150 Million Gold.com Deal Could Make Tokenized Gold Mainstream
Finance International Crypto News News
How Amazon and Starlink Are Racing to Connect Africa to the Internet
War News
China’s Digital Footprint in Kenya and Beyond
News Opinion Politics Technology News
The Rise of Robot Boxing: Inside the Future of Combat Sports and Technology
ai Boxing News
What “Wall Street Crypto” Really Looks Like
Cryptocurrency Finance News
Meta and Banned Online Gambling Ads
International Crypto News Opinion Politics
India’s Crypto Monitoring and Compliance Drive
Cryptocurrency Finance News Political News
CFTC’s New Innovation Advisory Committee and Its Meaning for Crypto
Cryptocurrency Finance International Crypto News
Malaysia’s Ringgit on the Blockchain: Why the Central Bank’s Stablecoin Pilots Could Reshape Money for Asia and Beyond
Finance Opinion Politics

You Might Also Like

GoMining NFT Miners and the Future of Bitcoin Mining ?

January 29, 2026

Australian Advisers at a Crossroads Crypto Demand Outpaces Traditional Advice Capacity

January 15, 2026

Binance Founder’s Attorney Slams Pay-to-Play Speculation After CZ Pardon

November 18, 2025

Sir Jim Ratcliffe’s Sky Interview, Immigration Debate and Manchester United Impact

February 12, 2026

FOMO Daily — delivering the stories, trends, and insights you can’t afford to miss.

We cut through the noise to bring you what’s shaping conversations, driving culture, and defining today — all in one quick, daily read.

  • Privacy Policy
  • Contact
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency

Subscribe to our newsletter to get the latest articles delivered to your inbox.

FOMO DailyFOMO Daily
Follow US
Copyright © 2026 FOMO Daily. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?